The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interchange of information through cell phones, Tabs and PDAs (Personal Digital Assistant) is the new trend in the era of digitization. In day-to-day activities, sensitive information through mobile phones is exchanged among the users. This sensitive information can be in the form of text messages, images, location, etc. The research on Android mobile applications was done at the MIT, and found that...
Sharing encrypted data with different users gained great attention in the cloud environment. There have some security issues like data leaks during data sharing, key management of shared data etc. In our project we developed a system which enables secure data sharing in the group of users as well as efficient key management. In our proposed system we used public key cryptography for securely storing...
As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale...
We introduce a robust and efficient mix-network for exponentiation, and use it to obtain a threshold decryption mix-network for ElGamal encrypted messages, in which mix servers do not need to trust each other for the correctness of the result. If a subset of mix servers cheat, they will be caught with an overwhelming probability, and the decryption can restart after replacing them, in a fashion that...
Healthcare sector has a large volume of information like health records of patients that needs to be collected and stored. These Patient Health Records when equipped digitally become Electronic Health Records (EHRs). This large amount of data collected as EHRs has to be stored, processed and updated frequently. Also the data of the patients has to be available whenever and wherever necessary. Cloud...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
SAMS (school affairs management system) was developed as one of the subsequent NEIS (national education information system) e-Government projects by Ministry of Education and Human Resource Development (MOE&HRD) in Korea. Politically NEIS was installed and managed in each provincial Office of Education so that huge amount of students' personal information is stored in central integrated NEIS database...
Privacy is needed in adhoc networks. A secured on demand position based private routing algorithm is proposed for communication anonymity and provide a security in mobile adhoc network. Here we use cryptography algorithm for providing security to prevent message hacking information from internal & external attackers. The position information of nodes is drawn by GPS (global positioning system)...
The Euler totient function and Euler-Fermat theorem utilised in the RSA scheme are extended from the integers to polynomials over finite fields. The new scheme is suited for both privacy and authentication implementations, as is its predecessor. The security of the system rests in part on the difficulty of determining the degrees of the irreducible factors of a high-degree polynomial.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.